Skip to main content

Trust: A Collision of Paradigms

  • Conference paper
  • First Online:
Financial Cryptography (FC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2339))

Included in the following conference series:

Abstract

The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be either a loss of trust or a willingness to tolerate increasing risk having weathered one assault. Examining human and computer interaction with a focus on evaluations, the human response to loss of trust is a key part of the search for more secure networks. The success of current efforts to design appropriate security mechanisms depends as much on an understanding of human extensions of trust to computers as it does on an understanding of underlying mathematics. However, the former has not been sufficiently examined.

In this work we survey the findings in social psychology and philosophy with respect to trust. We introduce three hypotheses that remain unanswered with respect to the manner in which humans react to computers. We discuss potential design revisions in light of findings from other disciplines. Then we conclude by noting that research which empowers users to be their own security manager may be based on a fundamentally flawed view of human-computer interaction. We close by encouraging designers of computer security systems to examine the humans, which these systems are intended to empower, and recommend that any security system be built on the basis of understanding of human trust provided by the social sciences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.E., Johnson, D.G., Gotterbarn, D., and Perrolle, J., 1993, “Using the ACM Code of Ethics in Decision making”, Communications of the ACM, Vol. 36, 98–107.

    Article  Google Scholar 

  2. Abric and Kahanês, 1972, “The effects of representations and behavior in experimental games”, European Journal of Social Psychology, Vol. 2, pp. 129–144.

    Article  Google Scholar 

  3. Axelrod, R., 1994, The Evolution of Cooperation, HarperCollins, USA.

    Google Scholar 

  4. Becker, Lawrence C. “Trust in Non-cognitive Security about Motives”, Ethics 107 (Oct. 1996): 43–61.

    Google Scholar 

  5. Blaze, M., Feigenbaum, J., and Lacy, J., 1996, “Decentralized Trust Management”, Proceedings of the IEEE Symposium on Security and Privacy, pp. 164–173.

    Google Scholar 

  6. Bloom, 1998, “Technology Experimentation, and the Quality of Survey Data”, Science, Vol. 280, pp. 847–848.

    Article  Google Scholar 

  7. Boston Consulting Group, 1997, Summary of Market Survey Results prepared for eTRUST, The Boston Consulting Group San Francisco, CA, March.

    Google Scholar 

  8. Clark and Blumenthal, “Rethinking the design of the Internet: The end to end arguments vs. the brave new world”, Telecommunications Policy Research Conference, Washington DC, September 2000.

    Google Scholar 

  9. Coleman, J., 1990, Foundations of Social Theory, Belknap Press, Cambridge, MA.

    Google Scholar 

  10. Compaine B.J., 1988, Issues in New Information Technology, Ablex Publishing; Norwood, NJ.

    Google Scholar 

  11. Computer Science and Telecommunications Board, 1994, Rights and Responsibilities of Participants in Networked Communities, National Academy Press, Washington, D.C.

    Google Scholar 

  12. Keisler, Sproull, and Waters, 1996, “A Prisoners Dilemma Experiments on Cooperation with People and Human-Like Computers”, Journal of Personality and Social Psychology, Vol. 70, pp. 47–65.

    Article  Google Scholar 

  13. Dawes, McTavish, and Shaklee, 1977, “Behavior, communication, and assumptions about other people’s behavior in a commons dilemma situation”, Journal of Personality and Social Psychology, Vol. 35, pp. 1–11.

    Article  Google Scholar 

  14. B. Friedman, P.H. Kahn, Jr., and D.C. Howe, “Trust Online”, Communications of the ACM, December 2000, Vol. 43, No. 12 pp. 34–40.

    Article  Google Scholar 

  15. Foley, 2000, “Can Micrsoft Squash 63,000 Bugs in Win2k?”, ZDnet Eweek, on-line edition, 11 February 2000, available at http://www.zdnet.com/eweek/stories/general/0,11011,2436920,00.html.

  16. Fukuyama F., 1996, Trust: The Social Virtues and the Creation of Prosperity, Free Press, NY, NY.

    Google Scholar 

  17. Garfinkle, 1994, PGP: Pretty Good Privacy, O’Reilly and Associates, Inc., Sebastopol, CA, pp. 235–236.

    Google Scholar 

  18. Hoffman, L. and Clark P., 1991, “Imminent policy considerations in the design and management of national and international computer networks”, IEEE Communications Magazine, February, pp. 68–74.

    Google Scholar 

  19. Kerr and Kaufman-Gilliland, 1994, “Communication, Commitment and cooperation in social dilemmas”, Journal of Personality and Social Psychology, Vol. 66, pp. 513–529.

    Article  Google Scholar 

  20. Luhmann, Niklas. “Trust: A Mechanism For the Reduction of Social Complexity”, Trust and Power: Two works by Niklas Luhmann. New York: John Wiley & Sons, 1979. pp. 1–103.

    Google Scholar 

  21. National Research Council, 1996, Cryptography’s Role in Securing the Information Society, National Academy Press, Washington, DC.

    Google Scholar 

  22. Nissenbaum, H. “Securing Trust Online: Wisdom or Oxymoron?” Forthcoming in Boston University Law Review.

    Google Scholar 

  23. Office of Technology Assessment, 1985, Electronic Surveillance and Civil Liberties, OTA-CIT-293, United States Government Printing Office; Gaithersburg, MD.

    Google Scholar 

  24. Office of Technology Assessment, 1986, Management, Security and Congressional Oversight, OTA-CIT-297, United States Government Printing Office; Gaithersburg, MD.

    Google Scholar 

  25. Seligman, Adam. The Problem of Trust. Princeton: Princeton University Press, 1997.

    Google Scholar 

  26. Slovic, Paul. “Perceived Risk, Trust, and Democracy”, Risk Analysis 13.6 (1993): 675–681.

    Article  Google Scholar 

  27. Sproull L. and Kiesler S., 1991, Connections, The MIT Press, Cambridge, MA.

    Google Scholar 

  28. Tygar and Whitten, 1996, “WWW Electronic Commerce and Java Trojan Horses”, Proceedings of the Second USENIX Workshop on Electronic Commerce, Nov. 18–21 Oakland, CA 1996, pp. 243–249.

    Google Scholar 

  29. United States Council for International Business, 1993, Statement of the United States Council for International Business on the Key Escrow Chip, United States Council for International Business, NY, NY.

    Google Scholar 

  30. Wacker, J., 1995, “Drafting agreements for secure electronic commerce”, Proceedings of the World Wide Electronic Commerce: Law, Policy, Security, and Controls Conference, October 18–20, Washington, DC, p. 6.

    Google Scholar 

  31. Walden, I., 1995, “Are privacy requirements inhibiting electronic commerce”, Proceedings of the World Wide Electronic Commerce: Law, Policy, Security, and Controls Conference, October 18–20, Washington, DC, p. 10.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Camp, L.J., Nissenbaum, H., McGrath, C. (2002). Trust: A Collision of Paradigms. In: Syverson, P. (eds) Financial Cryptography. FC 2001. Lecture Notes in Computer Science, vol 2339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46088-8_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-46088-8_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44079-6

  • Online ISBN: 978-3-540-46088-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics